Skip to main content
Log in

Anomaly detection in a mobile communication network

  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

Mobile communication networks produce massive amounts of data which may be useful in identifying the location of an emergency situation and the area it affects. We propose a one pass clustering algorithm for quickly identifying anomalous data points. We evaluate this algorithm’s ability to detect outliers in a data set and describe how such an algorithm may be used as a component of an emergency response management system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aggarwal CC, Han J, Wang J, Yu PS (2003) framework for clustering evolving data streams. In: Proceedings of the 29th VLDB conference

  • Associated Press (2005) Tracking cell phones for real-time traffic data

  • Babcock B, Babu S, Datar M, Motwanim R, Widom J (2002) Models and issues in data stream systems. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, pp 1–16

  • Belardo S, Karwan KR, Wallace WA (1984) Managing the response to disasters using microcomputers. Interfaces 14(2):29–39

    Article  Google Scholar 

  • Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18(9):509–517

    Article  Google Scholar 

  • Bicking C, Gryna Jr FM (1979) Quality control handbook. McGraw-Hill, New York

    Google Scholar 

  • Cheu EY, Keongg C, Zhou Z (2004) On the two-level hybrid clustering algorithm. In: International conference on artificial intelligence in science and technology, pp 138–142

  • Chipman H, Tibshirani R (2006) Hybrid hierarchical clustering with applications to microarray data. Biostatistics 7(2):286–301

    Article  Google Scholar 

  • Guha S, Meyerson A, Mishra N, Motwani R, O’Callaghan L (2003) Clustering data streams: theory and practice. IEEE Trans Knowl Data Eng 3:515–528

    Article  Google Scholar 

  • Hartigan JA (1975) Clustering algorithms. Wiley series in probability and mathematical statistics. Wiley, New York

    Google Scholar 

  • Hodge VJ, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126

    Article  Google Scholar 

  • Jain AK, Dubes RC (1998) Algorithms for clustering data. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  • Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surveys 31(3):264–323

    Article  Google Scholar 

  • Jennex ME (2007) Modeling emergency response systems. In: Proceedings of the 40th Hawaii international conference on system sciences

  • Madey GR, Barabási AL, Chawla NV, Gonzalez M, Hachen D, Lantz B, Pawling A, Schoenharl T, Szabó G, Wang P, Yan P (2007) Enhanced situational awareness: application of DDDAS concepts to emergency and disaster management. In: Alexandrov VN, van Albada GD, Sloot PMA, Dongarra J (eds) International conference on computational science. Lecture notes in computer science. Springer, Berlin

    Google Scholar 

  • Markou M, Singh S (2003a) Novelty detection: a review. part 1: statistical approaches. Signal Process 83(12):2481–2497

    Article  Google Scholar 

  • Markou M, Singh S (2003b) Novelty detection: a review. part 2: neural network based approaches. Signal Process 83(12):2499–2521

    Article  Google Scholar 

  • Moore A (1999) Very fast EM-based mixture model clustering using multiresolution kd-trees. In: Kearns M, Cohn D (eds) Advances in neural information processing systems. Kaufman, Los Altos, pp 543–549

    Google Scholar 

  • National Science Foundation (2006) Real-time traffic routing from the comfort of your car. Press release 06-124. http://www.nsf.gov/news/news_summ.jsp?cntn_id=107972

  • Pelleg D, Moore A (1999) Accelerating exact k-means algorithms with geometric reasoning. In: Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 277–281

    Chapter  Google Scholar 

  • Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: ACM workshop on data mining applied to security

  • Schoenharl T, Bravo R, Madey G (2006a) WIPER: leveraging the cell phone network for emergency response. Int J Intell Control Syst 11(4):209–216

    Google Scholar 

  • Schoenharl T, Madey G, Szabó G, Barabási AL (2006b) WIPER: multi-agent system for emergency response. In: Proceedings of the 3rd international ISCRAM conference

  • Sillem S, Wiersma E (2006) Comparing cell broadcast and text messaging for citizen warning. In: Proceedings of the 3rd international ISCRAM conference

  • Smart C, Vertinsky I (1977) Designs for crisis decision units. Adm Sci Q 22:640–657

    Article  Google Scholar 

  • Surdeanu M, Turmo J, Ageno A (2005) A hybrid unsupervised approach for document clustering. In: Proceedings of the 5th ACM SIGKDD international conference on knowledge discovery and data mining

  • Tsymbal A (2004) The problem of concept drift: definitions and related work. Technical report TCD-CS-2004-15, Trinity College, Dublin

  • Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques, 2nd edn. Kaufman, Los Altos

    Google Scholar 

  • Wood M (2005) Cell@lert, for government-to-citizen mass communications in emergencies; it’s about time. In: Proceedings of the second international ISCRAM conference

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alec Pawling.

Additional information

This paper won the best student paper award at the North American Association for Computational and Organizational Science (NAACSOS) Conference 2006, University of Notre Dame, Notre Dame, IN, USA.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pawling, A., Chawla, N.V. & Madey, G. Anomaly detection in a mobile communication network. Comput Math Organiz Theor 13, 407–422 (2007). https://doi.org/10.1007/s10588-007-9018-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-007-9018-7

Keywords

Navigation